Security Architecture Flashcards
Access control is a way to discover
Who is accessing the information? (the Subject doing the accessing)
What is being accessed? (the Objects) being accessed)
How might the access occur? (the mechanism(s) used for access)
What are the major concepts of access control
Subject, Object, Permissions, Rights
What is the difference between a permission and a right
Through their rights (policy) users are granted permissions.
Describe the interaction between subjects, rights, permissions and objects
Subjects - WHO
Rights - HOW
Permissions - HOW
Objects - WHAT
Access control coupled with __________ establishes the basis for accountability
Auditing
Auditing is
The process of recording access control actions
A system should be governed by a written standard that specifies the rules applicable to the system. These rules are derived from
- Laws
- Regulations
- Industry standards
- Organisational policies
The compilation of rules applicable to a particular IT system forms the
security policy
The security policy addresses
managerial, operational, and technical security requirements for a system.
More often than not ______________________ in an IT system represents the bulk of the technical security within the security policy. The interpretation of the correct
access control and auditing
Access control at the network level tends to be more (1) such as allowing or disallowing access to (2)
connection oriented
ports and protocols associated with given IP addresses.
Each subject identified in an ACL is known as an
Access control entity
The _____________ is used to manage each ACL in the system
ACL repository
_____________ is the predominant access control technique in use today. Most commodity systems implement some form of it in some form.
Discretionary Access Control (DAC)
The underlying concept of DAC is
to give an object owner the discretion to decide who is authorised access to an object and to what extent.
Why does the read permission not always mean read only
In the case of files it normally also means read and copy
What is important to remember about the write permission
It can also mean to delete, because a file can be overwritten with a single byte
Given the Read, Write and Execute problems that attend DAC systems what are some implementation strategies that mitigate them
- Limit access to essential objects only.
- Label sensitive data.
- Filter information where possible.
- Promulgate guidance that prohibits unauthorised duplication of
information.
5 Conduct monitoring for noncompliance.
__________________________ is the primary means of controlling system integrity. Why do viruses often gain complete access to a system?
Preventing unauthorized modification of resources is the primary
means of controlling system integrity. Why do viruses often gain complete
access to a system? Excessive permissions on configuration settings and files allow the virus to write to or delete critical files.
Access control mechanisms that are neither DAC nor mandatory access control (MAC) are referred to as forms of
nondiscretionary access control.
Types of non-discretionary access control
- Role-Based Access Control (RBAC)
- Originator Controlled (ORCON)
- Digital Rights Management (DRM)
- Usage Controlled (UCON)
- Rule-Based Access Control -
MAC functions by associating 1. level with the 2. level of the target object. It is important to note that systems supporting
- A subject’s clearance level with
- The sensitivity level of the target object.
What are common reasons why users receive rights and permissions that go beyond what is needed for the task?
- Lack of explicit definition of duties - Neither the user nor manager
has a clear grasp or definition of the duties assigned to the
individual. - Weak internal controls - Where explicit duties are known, changes
in duties or access controls on the system may not be periodically
reviewed for conflicts. - Complexities in administration - In very large, distributed
organizations, it is difficult to know the access limitations that
should be imposed when access control is centralized.
Security design efforts should consider various aspects that could affect
separation of duties. At a minimum, it should be possible to enforce separation of duties through the user access control mechanisms whether the designation is manual or automated. A system should have sufficient administrative flexibility to accommodate the following aspects:
- Identify each explicit role
- Assign appropriate permissions
- Avoid unnecessary rights
- mitigate workflow violation potential
What techniques can be used in small organisations to help with the problem of separation of duties?
Assign accounts on a per-role basis - An individual should have a
separate account for each role used.
Prevent those with multiple roles from reading and writing to the
same storage area
Auditing is vital - Consider implementing object-level auditing for
individuals with multiple roles.
Conduct more frequent evaluations
All of the technical security controls in a system are collectively referred to as
the Trusted Computing Base (TCB).
The overall security of a system is no stronger than
the most vulnerable components of the TCB
What are the most common components of the TCB of most enterprise systems.
Port Locking and Network Access Control (switches)
User management and resource control (Workstations and Servers)
Network Filtering and Access Control (Routers)
Business data access rules (Databases)
Boundary protections (firewalls)
Information Flow Control (Application servers)
A _________________ is the collection of components of a TCB that mediate all
access within a system. It is important to note that a security kernel may be
Security Kernel
The most common functions of the security kernel include
Authentication, auditing, and access control.
The operational aspect of the security functions is referred to as
The security reference monitor
What does a security reference monitor generally do
Compares an access request against a listing that describes the allowed actions
What does the acronym AAA refer to
Authentication, Authorisation and Accounting